Sciweavers

193 search results - page 31 / 39
» Security support for in-network processing in Wireless Senso...
Sort
View
CORR
2008
Springer
192views Education» more  CORR 2008»
13 years 6 months ago
Anomaly Detection in Streaming Sensor Data
In this chapter we consider a cell phone network as a set of automatically deployed sensors that records movement and interaction patterns of the population. We discuss methods fo...
Alec Pawling, Ping Yan, Julián Candia, Timo...
TWC
2010
13 years 2 months ago
Distributed Routing Algorithms for Underwater Acoustic Sensor Networks
Underwater Acoustic Sensor Networks (UW-ASNs) consist of devices with sensing, processing, and communication capabilities that are deployed underwater to perform collaborative moni...
Dario Pompili, Tommaso Melodia, Ian F. Akyildiz
WINET
2010
147views more  WINET 2010»
13 years 6 months ago
Hybrid trust and reputation management for sensor networks
Wireless sensor networks are characterised by the distributed nature of their operation and the resource constraints on the nodes. Trust management schemes that are targeted at sen...
Efthimia Aivaloglou, Stefanos Gritzalis
SENSYS
2004
ACM
14 years 1 months ago
Medians and beyond: new aggregation techniques for sensor networks
Wireless sensor networks offer the potential to span and monitor large geographical areas inexpensively. Sensors, however, have significant power constraint (battery life), makin...
Nisheeth Shrivastava, Chiranjeeb Buragohain, Divya...
WWW
2008
ACM
14 years 8 months ago
Forcehttps: protecting high-security web sites from network attacks
As wireless networks proliferate, web browsers operate in an increasingly hostile network environment. The HTTPS protocol has the potential to protect web users from network attac...
Collin Jackson, Adam Barth